{"id":30890,"date":"2023-10-16T11:44:05","date_gmt":"2023-10-16T11:44:05","guid":{"rendered":"https:\/\/kalilinuxtutorials.com\/?p=30890"},"modified":"2023-10-16T11:44:09","modified_gmt":"2023-10-16T11:44:09","slug":"postdump","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/postdump\/","title":{"rendered":"POSTDump &#8211; Evading Detection And Safely Dumping LSASS Memory"},"content":{"rendered":"\n<p>Another tool to perform minidump of LSASS process using few technics to avoid detection. <\/p>\n\n\n\n<p>POSTDump is the C# \/ .NET implementation of the ReactOS minidump function (like nanodump), thus avoiding call to the Windows API MiniDumpWriteDump function. <\/p>\n\n\n\n<p>The dump logic code is saved under the&nbsp;<code>POSTMinidump<\/code>&nbsp;project, feel free to use it for your own projects. Such as NanoDump, you can encrypt or use an invalid signature for the minidump.<\/p>\n\n\n\n<p>Usage of ProcExp driver is supported to dump\/kill protected processes.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"user-content-usage\"><strong><a href=\"https:\/\/github.com\/YOLOP0wn\/POSTDump#usage\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Usage<\/a><\/strong><\/h2>\n\n\n\n<p>Dump LSASS:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>c:\\Temp&gt;PostDump.exe --help\n\n-o, --output        Output filename &#91;default: Machine_datetime.dmp] (fullpath handled)\n\n-e, --encrypt       Encrypt dump in-memory\n\n-s, --signature     Generate invalid Minidump signature\n\n--snap              Use snapshot technic\n\n--fork              Use fork technic &#91;default]\n\n--elevate-handle    Open a handle to LSASS with low privileges and duplicate it to gain higher privileges\n\n--duplicate-elevate Look for existing lsass handle to duplicate and elevate\n\n--asr               Attempt LSASS dump using ASR bypass (win10\/11\/2019) (no signature\/no encrypt)\n\n--driver            Use Process Explorer driver to open lsass handle (bypass PPL) and dump lsass\n\n--kill &#91;processID]  Use Process Explorer driver to kill process and exit\n\n--help              Display this help screen.\n\n--version           Display version information.<\/code><\/pre>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"user-content-evasion\"><strong><a href=\"https:\/\/github.com\/YOLOP0wn\/POSTDump#evasion\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Evasion<\/a><\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Usage of indirect syscall along with halo&#8217;s gate technic to retrieve syscalls IDs<\/li>\n\n\n\n<li>No memory Allocation\/Protection call is performed for indirect syscall, instead, free RWX codecave found in the current process are used<\/li>\n\n\n\n<li>ETW patching<\/li>\n\n\n\n<li>No call to MiniDumpWriteDump<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"user-content-improvements-idea\"><strong><a href=\"https:\/\/github.com\/YOLOP0wn\/POSTDump#improvements-idea\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Improvements Idea<\/a><\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Implement more dump technics (seclogon, PPLMedic, Shtinkering ..)<\/li>\n\n\n\n<li>More evasion technics (callstack spoofing)<\/li>\n\n\n\n<li>Implement&nbsp;<a href=\"https:\/\/github.com\/gabriellandau\/PPLFault\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Godfault<\/a>&nbsp;to avoid driver usage<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"user-content-compilation\"><strong><a href=\"https:\/\/github.com\/YOLOP0wn\/POSTDump#compilation\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Compilation<\/a><\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>You can build using .NET Framework 4.5.1 as-is.<\/li>\n\n\n\n<li>Depending of the CLR version installed on the system where you execute PostDump, you may need to downgrade to .NET 3.5&nbsp;<a href=\"https:\/\/learn.microsoft.com\/fr-fr\/dotnet\/framework\/migration-guide\/versions-and-dependencies\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">more info here<\/a><\/li>\n<\/ul>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Another tool to perform minidump of LSASS process using few technics to avoid detection. POSTDump is the C# \/ .NET implementation of the ReactOS minidump function (like nanodump), thus avoiding call to the Windows API MiniDumpWriteDump function. The dump logic code is saved under the&nbsp;POSTMinidump&nbsp;project, feel free to use it for your own projects. Such [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":30892,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgT6zhlqJ5nkEdv_3U5azWGJVgj1JttxeAVTI04tQL9S9J846Dn0yWaxZU_SZwFPoXPn9j-3YnjdqTyyF7Zf1p-4rnrzkm9k6Jf1JOG5NYKvQSvRCAIx7zgZDEDMv8NO3ktwpcg2Ujd8oDRrsQRFlW82qb5uosYakGAnSv7iL_JBPNBJSrNCEz1Hoy0Uu_y\/s16000\/Untitled%20design%20(28).webp","fifu_image_alt":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[20],"tags":[737,6321,6052,6325,6363],"class_list":["post-30890","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security","tag-cybersecurity","tag-informationsecurity","tag-kalilinux","tag-kalilinuxtools","tag-postdump"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>POSTDump<\/title>\n<meta name=\"description\" content=\"Another tool to perform minidump of LSASS process using few technics to avoid detection. POSTDump is the C# \/ .NET implementation\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/postdump\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"POSTDump\" \/>\n<meta property=\"og:description\" content=\"Another tool to perform minidump of LSASS process using few technics to avoid detection. POSTDump is the C# \/ .NET implementation\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/postdump\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2023-10-16T11:44:05+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-10-16T11:44:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgT6zhlqJ5nkEdv_3U5azWGJVgj1JttxeAVTI04tQL9S9J846Dn0yWaxZU_SZwFPoXPn9j-3YnjdqTyyF7Zf1p-4rnrzkm9k6Jf1JOG5NYKvQSvRCAIx7zgZDEDMv8NO3ktwpcg2Ujd8oDRrsQRFlW82qb5uosYakGAnSv7iL_JBPNBJSrNCEz1Hoy0Uu_y\/s16000\/Untitled%20design%20(28).webp\" \/>\n<meta name=\"author\" content=\"Varshini\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgT6zhlqJ5nkEdv_3U5azWGJVgj1JttxeAVTI04tQL9S9J846Dn0yWaxZU_SZwFPoXPn9j-3YnjdqTyyF7Zf1p-4rnrzkm9k6Jf1JOG5NYKvQSvRCAIx7zgZDEDMv8NO3ktwpcg2Ujd8oDRrsQRFlW82qb5uosYakGAnSv7iL_JBPNBJSrNCEz1Hoy0Uu_y\/s16000\/Untitled%20design%20(28).webp\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Varshini\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/postdump\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/postdump\/\"},\"author\":{\"name\":\"Varshini\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa\"},\"headline\":\"POSTDump &#8211; Evading Detection And Safely Dumping LSASS Memory\",\"datePublished\":\"2023-10-16T11:44:05+00:00\",\"dateModified\":\"2023-10-16T11:44:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/postdump\/\"},\"wordCount\":189,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/postdump\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgT6zhlqJ5nkEdv_3U5azWGJVgj1JttxeAVTI04tQL9S9J846Dn0yWaxZU_SZwFPoXPn9j-3YnjdqTyyF7Zf1p-4rnrzkm9k6Jf1JOG5NYKvQSvRCAIx7zgZDEDMv8NO3ktwpcg2Ujd8oDRrsQRFlW82qb5uosYakGAnSv7iL_JBPNBJSrNCEz1Hoy0Uu_y\/s16000\/Untitled%20design%20(28).webp\",\"keywords\":[\"cybersecurity\",\"informationsecurity\",\"kalilinux\",\"kalilinuxtools\",\"POSTDump\"],\"articleSection\":[\"Cyber security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/postdump\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/postdump\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/postdump\/\",\"name\":\"POSTDump\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/postdump\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/postdump\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgT6zhlqJ5nkEdv_3U5azWGJVgj1JttxeAVTI04tQL9S9J846Dn0yWaxZU_SZwFPoXPn9j-3YnjdqTyyF7Zf1p-4rnrzkm9k6Jf1JOG5NYKvQSvRCAIx7zgZDEDMv8NO3ktwpcg2Ujd8oDRrsQRFlW82qb5uosYakGAnSv7iL_JBPNBJSrNCEz1Hoy0Uu_y\/s16000\/Untitled%20design%20(28).webp\",\"datePublished\":\"2023-10-16T11:44:05+00:00\",\"dateModified\":\"2023-10-16T11:44:09+00:00\",\"description\":\"Another tool to perform minidump of LSASS process using few technics to avoid detection. POSTDump is the C# \/ .NET implementation\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/postdump\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/postdump\/#primaryimage\",\"url\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgT6zhlqJ5nkEdv_3U5azWGJVgj1JttxeAVTI04tQL9S9J846Dn0yWaxZU_SZwFPoXPn9j-3YnjdqTyyF7Zf1p-4rnrzkm9k6Jf1JOG5NYKvQSvRCAIx7zgZDEDMv8NO3ktwpcg2Ujd8oDRrsQRFlW82qb5uosYakGAnSv7iL_JBPNBJSrNCEz1Hoy0Uu_y\/s16000\/Untitled%20design%20(28).webp\",\"contentUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgT6zhlqJ5nkEdv_3U5azWGJVgj1JttxeAVTI04tQL9S9J846Dn0yWaxZU_SZwFPoXPn9j-3YnjdqTyyF7Zf1p-4rnrzkm9k6Jf1JOG5NYKvQSvRCAIx7zgZDEDMv8NO3ktwpcg2Ujd8oDRrsQRFlW82qb5uosYakGAnSv7iL_JBPNBJSrNCEz1Hoy0Uu_y\/s16000\/Untitled%20design%20(28).webp\",\"width\":\"1600\",\"height\":\"900\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa\",\"name\":\"Varshini\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g\",\"caption\":\"Varshini\"},\"description\":\"Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.\",\"sameAs\":[\"http:\/\/kalilinuxtutorials.com\",\"https:\/\/www.linkedin.com\/in\/senthamil-selvan-14043a285\/\"],\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/vinayakagrawal\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"POSTDump","description":"Another tool to perform minidump of LSASS process using few technics to avoid detection. POSTDump is the C# \/ .NET implementation","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/postdump\/","og_locale":"en_US","og_type":"article","og_title":"POSTDump","og_description":"Another tool to perform minidump of LSASS process using few technics to avoid detection. POSTDump is the C# \/ .NET implementation","og_url":"https:\/\/kalilinuxtutorials.com\/postdump\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2023-10-16T11:44:05+00:00","article_modified_time":"2023-10-16T11:44:09+00:00","og_image":[{"url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgT6zhlqJ5nkEdv_3U5azWGJVgj1JttxeAVTI04tQL9S9J846Dn0yWaxZU_SZwFPoXPn9j-3YnjdqTyyF7Zf1p-4rnrzkm9k6Jf1JOG5NYKvQSvRCAIx7zgZDEDMv8NO3ktwpcg2Ujd8oDRrsQRFlW82qb5uosYakGAnSv7iL_JBPNBJSrNCEz1Hoy0Uu_y\/s16000\/Untitled%20design%20(28).webp","type":"","width":"","height":""}],"author":"Varshini","twitter_card":"summary_large_image","twitter_image":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgT6zhlqJ5nkEdv_3U5azWGJVgj1JttxeAVTI04tQL9S9J846Dn0yWaxZU_SZwFPoXPn9j-3YnjdqTyyF7Zf1p-4rnrzkm9k6Jf1JOG5NYKvQSvRCAIx7zgZDEDMv8NO3ktwpcg2Ujd8oDRrsQRFlW82qb5uosYakGAnSv7iL_JBPNBJSrNCEz1Hoy0Uu_y\/s16000\/Untitled%20design%20(28).webp","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"Varshini","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/postdump\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/postdump\/"},"author":{"name":"Varshini","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa"},"headline":"POSTDump &#8211; Evading Detection And Safely Dumping LSASS Memory","datePublished":"2023-10-16T11:44:05+00:00","dateModified":"2023-10-16T11:44:09+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/postdump\/"},"wordCount":189,"commentCount":0,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/postdump\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgT6zhlqJ5nkEdv_3U5azWGJVgj1JttxeAVTI04tQL9S9J846Dn0yWaxZU_SZwFPoXPn9j-3YnjdqTyyF7Zf1p-4rnrzkm9k6Jf1JOG5NYKvQSvRCAIx7zgZDEDMv8NO3ktwpcg2Ujd8oDRrsQRFlW82qb5uosYakGAnSv7iL_JBPNBJSrNCEz1Hoy0Uu_y\/s16000\/Untitled%20design%20(28).webp","keywords":["cybersecurity","informationsecurity","kalilinux","kalilinuxtools","POSTDump"],"articleSection":["Cyber security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kalilinuxtutorials.com\/postdump\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/postdump\/","url":"https:\/\/kalilinuxtutorials.com\/postdump\/","name":"POSTDump","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/postdump\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/postdump\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgT6zhlqJ5nkEdv_3U5azWGJVgj1JttxeAVTI04tQL9S9J846Dn0yWaxZU_SZwFPoXPn9j-3YnjdqTyyF7Zf1p-4rnrzkm9k6Jf1JOG5NYKvQSvRCAIx7zgZDEDMv8NO3ktwpcg2Ujd8oDRrsQRFlW82qb5uosYakGAnSv7iL_JBPNBJSrNCEz1Hoy0Uu_y\/s16000\/Untitled%20design%20(28).webp","datePublished":"2023-10-16T11:44:05+00:00","dateModified":"2023-10-16T11:44:09+00:00","description":"Another tool to perform minidump of LSASS process using few technics to avoid detection. POSTDump is the C# \/ .NET implementation","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/postdump\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/postdump\/#primaryimage","url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgT6zhlqJ5nkEdv_3U5azWGJVgj1JttxeAVTI04tQL9S9J846Dn0yWaxZU_SZwFPoXPn9j-3YnjdqTyyF7Zf1p-4rnrzkm9k6Jf1JOG5NYKvQSvRCAIx7zgZDEDMv8NO3ktwpcg2Ujd8oDRrsQRFlW82qb5uosYakGAnSv7iL_JBPNBJSrNCEz1Hoy0Uu_y\/s16000\/Untitled%20design%20(28).webp","contentUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgT6zhlqJ5nkEdv_3U5azWGJVgj1JttxeAVTI04tQL9S9J846Dn0yWaxZU_SZwFPoXPn9j-3YnjdqTyyF7Zf1p-4rnrzkm9k6Jf1JOG5NYKvQSvRCAIx7zgZDEDMv8NO3ktwpcg2Ujd8oDRrsQRFlW82qb5uosYakGAnSv7iL_JBPNBJSrNCEz1Hoy0Uu_y\/s16000\/Untitled%20design%20(28).webp","width":"1600","height":"900"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa","name":"Varshini","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g","caption":"Varshini"},"description":"Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.","sameAs":["http:\/\/kalilinuxtutorials.com","https:\/\/www.linkedin.com\/in\/senthamil-selvan-14043a285\/"],"url":"https:\/\/kalilinuxtutorials.com\/author\/vinayakagrawal\/"}]}},"jetpack_featured_media_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgT6zhlqJ5nkEdv_3U5azWGJVgj1JttxeAVTI04tQL9S9J846Dn0yWaxZU_SZwFPoXPn9j-3YnjdqTyyF7Zf1p-4rnrzkm9k6Jf1JOG5NYKvQSvRCAIx7zgZDEDMv8NO3ktwpcg2Ujd8oDRrsQRFlW82qb5uosYakGAnSv7iL_JBPNBJSrNCEz1Hoy0Uu_y\/s16000\/Untitled%20design%20(28).webp","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":25265,"url":"https:\/\/kalilinuxtutorials.com\/nanodump\/","url_meta":{"origin":30890,"position":0},"title":"Nanodump : A Crappy LSASS Dumper With No ASCII Art","author":"R K","date":"June 19, 2022","format":false,"excerpt":"Nanodump, a flexible tool that creates a minidump of the LSASS process. Features It uses syscalls (with\u00a0SysWhispers2) for most operations.Syscalls are called from an\u00a0ntdll\u00a0address to bypass some syscall detections.It sets the syscall callback hook to NULL.Windows APIs are called using dynamic invoke.You can choose to download the dump without touching\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiENqdJgkaKOZyrSip4JpvgCc11J3ltKXyqXatcgV-lb51ne0HFzgDv7Arz615o2IjKIMAXAuV2GOG6IdOAf8UTyaxGLe0ZKuM5f_XmPf-elci0irrjb-VYujcBVv5SWimshUFrU5cmJ8jfiBnMiiNhcdz97Zt4R7-8m5ayuax3zY320-yLsBH2F_3m\/s728\/nanodump-a-crappy-lsass-dumper-with-no-ascii-art.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiENqdJgkaKOZyrSip4JpvgCc11J3ltKXyqXatcgV-lb51ne0HFzgDv7Arz615o2IjKIMAXAuV2GOG6IdOAf8UTyaxGLe0ZKuM5f_XmPf-elci0irrjb-VYujcBVv5SWimshUFrU5cmJ8jfiBnMiiNhcdz97Zt4R7-8m5ayuax3zY320-yLsBH2F_3m\/s728\/nanodump-a-crappy-lsass-dumper-with-no-ascii-art.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiENqdJgkaKOZyrSip4JpvgCc11J3ltKXyqXatcgV-lb51ne0HFzgDv7Arz615o2IjKIMAXAuV2GOG6IdOAf8UTyaxGLe0ZKuM5f_XmPf-elci0irrjb-VYujcBVv5SWimshUFrU5cmJ8jfiBnMiiNhcdz97Zt4R7-8m5ayuax3zY320-yLsBH2F_3m\/s728\/nanodump-a-crappy-lsass-dumper-with-no-ascii-art.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiENqdJgkaKOZyrSip4JpvgCc11J3ltKXyqXatcgV-lb51ne0HFzgDv7Arz615o2IjKIMAXAuV2GOG6IdOAf8UTyaxGLe0ZKuM5f_XmPf-elci0irrjb-VYujcBVv5SWimshUFrU5cmJ8jfiBnMiiNhcdz97Zt4R7-8m5ayuax3zY320-yLsBH2F_3m\/s728\/nanodump-a-crappy-lsass-dumper-with-no-ascii-art.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":32690,"url":"https:\/\/kalilinuxtutorials.com\/nativedump\/","url_meta":{"origin":30890,"position":1},"title":"NativeDump : A Cutting-Edge Approach For Secure Minidump Creation","author":"Varshini","date":"April 9, 2024","format":false,"excerpt":"NativeDump allows to dump the lsass process using only NTAPIs generating a Minidump file with only the streams needed to be parsed by tools like Mimikatz or Pypykatz (SystemInfo, ModuleList and Memory64List Streams). NTOpenProcessToken and NtAdjustPrivilegeToken to get the \"SeDebugPrivilege\" privilege RtlGetVersion to get the Operating System version details (Major\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi5Ft-UOoGI6eIMENI3BEOv6H1NBpCE_VgvLXHbQtSJSDwjzy-zKxXOVwO0MTOOuJjPbjzCH-_v-UY9h1Fhvzlsx5KYwE3YIWQQnSsbe4vVvSzT7MXUq0LTE6UufYmuJWMIlSb1snC0FOzn05-pfgmog3AP3hw9hNrtDjLrdCIrSdJ_cVPYz4cce9GLMp-h\/s16000\/NativeDump%20.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi5Ft-UOoGI6eIMENI3BEOv6H1NBpCE_VgvLXHbQtSJSDwjzy-zKxXOVwO0MTOOuJjPbjzCH-_v-UY9h1Fhvzlsx5KYwE3YIWQQnSsbe4vVvSzT7MXUq0LTE6UufYmuJWMIlSb1snC0FOzn05-pfgmog3AP3hw9hNrtDjLrdCIrSdJ_cVPYz4cce9GLMp-h\/s16000\/NativeDump%20.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi5Ft-UOoGI6eIMENI3BEOv6H1NBpCE_VgvLXHbQtSJSDwjzy-zKxXOVwO0MTOOuJjPbjzCH-_v-UY9h1Fhvzlsx5KYwE3YIWQQnSsbe4vVvSzT7MXUq0LTE6UufYmuJWMIlSb1snC0FOzn05-pfgmog3AP3hw9hNrtDjLrdCIrSdJ_cVPYz4cce9GLMp-h\/s16000\/NativeDump%20.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi5Ft-UOoGI6eIMENI3BEOv6H1NBpCE_VgvLXHbQtSJSDwjzy-zKxXOVwO0MTOOuJjPbjzCH-_v-UY9h1Fhvzlsx5KYwE3YIWQQnSsbe4vVvSzT7MXUq0LTE6UufYmuJWMIlSb1snC0FOzn05-pfgmog3AP3hw9hNrtDjLrdCIrSdJ_cVPYz4cce9GLMp-h\/s16000\/NativeDump%20.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi5Ft-UOoGI6eIMENI3BEOv6H1NBpCE_VgvLXHbQtSJSDwjzy-zKxXOVwO0MTOOuJjPbjzCH-_v-UY9h1Fhvzlsx5KYwE3YIWQQnSsbe4vVvSzT7MXUq0LTE6UufYmuJWMIlSb1snC0FOzn05-pfgmog3AP3hw9hNrtDjLrdCIrSdJ_cVPYz4cce9GLMp-h\/s16000\/NativeDump%20.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi5Ft-UOoGI6eIMENI3BEOv6H1NBpCE_VgvLXHbQtSJSDwjzy-zKxXOVwO0MTOOuJjPbjzCH-_v-UY9h1Fhvzlsx5KYwE3YIWQQnSsbe4vVvSzT7MXUq0LTE6UufYmuJWMIlSb1snC0FOzn05-pfgmog3AP3hw9hNrtDjLrdCIrSdJ_cVPYz4cce9GLMp-h\/s16000\/NativeDump%20.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":34427,"url":"https:\/\/kalilinuxtutorials.com\/trickdump\/","url_meta":{"origin":30890,"position":2},"title":"TrickDump &#8211; Evading Detection With Advanced Memory Dump Techniques","author":"Varshini","date":"August 13, 2024","format":false,"excerpt":"TrickDump dumps the lsass process without creating a Minidump file, generating instead 3 JSON and 1 ZIP file with the memory region dumps. In three steps: Lock: Get OS information using RtlGetVersion. Shock: Get SeDebugPrivilege privilege with NtOpenProcessToken and NtAdjustPrivilegeToken, open a handle with NtGetNextProcess and NtQueryInformationProcess and then get\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhge8lmol9tZGvsYT34G1Pa6vf2i-YKE59kzZddxGEDZO3RT4ITcAFYkFNq16MT0B_ZwC5XIgK6XQW0ztNtD7IWLygGLQevIBe4IBZcQPkDSaLLE11sjRSz9o3A-Lyy6IMewjuD_tkdJd3LiZwjI8Rl6U6lieXCIxUO327fB4_c-j0btXhy5xR9k9k2LhYn\/s16000\/TrickDump%20.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhge8lmol9tZGvsYT34G1Pa6vf2i-YKE59kzZddxGEDZO3RT4ITcAFYkFNq16MT0B_ZwC5XIgK6XQW0ztNtD7IWLygGLQevIBe4IBZcQPkDSaLLE11sjRSz9o3A-Lyy6IMewjuD_tkdJd3LiZwjI8Rl6U6lieXCIxUO327fB4_c-j0btXhy5xR9k9k2LhYn\/s16000\/TrickDump%20.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhge8lmol9tZGvsYT34G1Pa6vf2i-YKE59kzZddxGEDZO3RT4ITcAFYkFNq16MT0B_ZwC5XIgK6XQW0ztNtD7IWLygGLQevIBe4IBZcQPkDSaLLE11sjRSz9o3A-Lyy6IMewjuD_tkdJd3LiZwjI8Rl6U6lieXCIxUO327fB4_c-j0btXhy5xR9k9k2LhYn\/s16000\/TrickDump%20.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhge8lmol9tZGvsYT34G1Pa6vf2i-YKE59kzZddxGEDZO3RT4ITcAFYkFNq16MT0B_ZwC5XIgK6XQW0ztNtD7IWLygGLQevIBe4IBZcQPkDSaLLE11sjRSz9o3A-Lyy6IMewjuD_tkdJd3LiZwjI8Rl6U6lieXCIxUO327fB4_c-j0btXhy5xR9k9k2LhYn\/s16000\/TrickDump%20.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhge8lmol9tZGvsYT34G1Pa6vf2i-YKE59kzZddxGEDZO3RT4ITcAFYkFNq16MT0B_ZwC5XIgK6XQW0ztNtD7IWLygGLQevIBe4IBZcQPkDSaLLE11sjRSz9o3A-Lyy6IMewjuD_tkdJd3LiZwjI8Rl6U6lieXCIxUO327fB4_c-j0btXhy5xR9k9k2LhYn\/s16000\/TrickDump%20.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhge8lmol9tZGvsYT34G1Pa6vf2i-YKE59kzZddxGEDZO3RT4ITcAFYkFNq16MT0B_ZwC5XIgK6XQW0ztNtD7IWLygGLQevIBe4IBZcQPkDSaLLE11sjRSz9o3A-Lyy6IMewjuD_tkdJd3LiZwjI8Rl6U6lieXCIxUO327fB4_c-j0btXhy5xR9k9k2LhYn\/s16000\/TrickDump%20.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":8410,"url":"https:\/\/kalilinuxtutorials.com\/lsassy-extract-credentials-lsass-remotel\/","url_meta":{"origin":30890,"position":3},"title":"Lsassy : Extract Credentials From Lsass Remotel","author":"R K","date":"January 19, 2020","format":false,"excerpt":"Lsassy is a tool used to extract credentials from lsass remotely. This library uses impacket project to remotely read necessary bytes in lsass dump and pypykatz to extract credentials. ChaptersDescriptionRequirementsRequirements to install lsassy from sourceInstallationInstallation commands from pip or from sourceBasic UsageCommand line template for standalone versionAdvanced UsageAdvanced usage (Dumping\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":25477,"url":"https:\/\/kalilinuxtutorials.com\/duplicatedump\/","url_meta":{"origin":30890,"position":4},"title":"DuplicateDump : Dumping LSASS With A Duplicated Handle From Custom LSA Plugin","author":"R K","date":"June 27, 2022","format":false,"excerpt":"DuplicateDump is a fork of\u00a0MirrorDump\u00a0with following modifications: DInovke implementationLSA plugin DLL written in C++ which could be clean up after dumping LSASS. MirrorDump compile LSA plugin as .NET assembly which would not be unloaded by LSASS process. That's why MirrorDump failed to delete the plugin.PID of dump process (i.e., DuplicateDump)\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgua8PUtgsZzgpAgU6TTbeQwWvp-jdPLCMyq0dQy4HvXpN9dhkBaynYddARktwtqUtLsc-sLfH06es2fCKOjG8BrzvloXJFYRHexPZ3gTeVwBLaiTnzx8TVWDO-4KoVFW8Tz3n7Y4HeTPqPLKnXTKOECG9S_dPBvKZkPx_bcesvJL5r0q8qRAgYA6SC\/s728\/duplicatedump-dumping-lsass-with-a-duplicated-handle-from-custom-lsa-plugin.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgua8PUtgsZzgpAgU6TTbeQwWvp-jdPLCMyq0dQy4HvXpN9dhkBaynYddARktwtqUtLsc-sLfH06es2fCKOjG8BrzvloXJFYRHexPZ3gTeVwBLaiTnzx8TVWDO-4KoVFW8Tz3n7Y4HeTPqPLKnXTKOECG9S_dPBvKZkPx_bcesvJL5r0q8qRAgYA6SC\/s728\/duplicatedump-dumping-lsass-with-a-duplicated-handle-from-custom-lsa-plugin.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgua8PUtgsZzgpAgU6TTbeQwWvp-jdPLCMyq0dQy4HvXpN9dhkBaynYddARktwtqUtLsc-sLfH06es2fCKOjG8BrzvloXJFYRHexPZ3gTeVwBLaiTnzx8TVWDO-4KoVFW8Tz3n7Y4HeTPqPLKnXTKOECG9S_dPBvKZkPx_bcesvJL5r0q8qRAgYA6SC\/s728\/duplicatedump-dumping-lsass-with-a-duplicated-handle-from-custom-lsa-plugin.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgua8PUtgsZzgpAgU6TTbeQwWvp-jdPLCMyq0dQy4HvXpN9dhkBaynYddARktwtqUtLsc-sLfH06es2fCKOjG8BrzvloXJFYRHexPZ3gTeVwBLaiTnzx8TVWDO-4KoVFW8Tz3n7Y4HeTPqPLKnXTKOECG9S_dPBvKZkPx_bcesvJL5r0q8qRAgYA6SC\/s728\/duplicatedump-dumping-lsass-with-a-duplicated-handle-from-custom-lsa-plugin.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":9831,"url":"https:\/\/kalilinuxtutorials.com\/pypykatz\/","url_meta":{"origin":30890,"position":5},"title":"Pypykatz : Mimikatz Implementation In Pure Python","author":"R K","date":"March 21, 2020","format":false,"excerpt":"Pypykatz is a mimikatz implementation in pure Python and can be runs on all OS's which support python>=3.6. Installing Install it via pip or by cloning it from github. The installer will create a pypykatz executable in the python's Script directory. You can run it from there, should be in\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/30890","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=30890"}],"version-history":[{"count":5,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/30890\/revisions"}],"predecessor-version":[{"id":30896,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/30890\/revisions\/30896"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/30892"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=30890"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=30890"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=30890"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}